[SOLVED] Data Visualization Workflow

Choose a publicly available data visualization. (be sure to provide the link, cite, and reference).Analyze the visualization within the context of the data visualization workflow.Create a proposal of enhancements to create a better user/viewer experience.Use the data visualization workflow as a framework for both your analysis and your proposal.Consider the various roles of the project team as specified by Kirk’s concept of “hats”.APA compliance required.References and In-text citations required.Minimum word count = 1500.

Read more

[SOLVED] Matrix Linear System

1 Preliminary step For all checks that are needed for the following questions, you should use the assert() function. All intermediate and final results should be plotted using the matplotlib package. In order for your results to be reproducible use the following seed np.random.seed(123).2 Fundamental Matrix Linear System (20 points) For this question you are asked to implement the following function:def fundamental_matrix_linear_system(pts1, pts2): “””Create linear equations for estimating the fundamental matrix in matrix form :param pts1: numpy.array(float), an array Nx2 that holds the source image points :param pts2: numpy.array(float), an array Nx2 that holds the destination image points :return:A: numpy.array(float), an array Nx8 that holds the left side coefficients of the linear equations b: numpy.array(float), an array Nx1 that holds the right side coefficients of the linear equations”””Using a number of corresponding points from the source (pts1) and destination (pts2) images as input, this function will return the array AAA 2 RN?8 and vector bbb 2 RN?1 of the linear system AAAxxx = bbb, where xxx 2 R8?1 is a vector that holds the parameters of the fundamental matrix (remember that f33 can be set to 1). You should check that N is at least 8 and that both pts1 and pts2 are two dimensional arrays and that their first dimension is equal to N and the second is equal to 2.3 Compute Epipolar Lines (10 points) In this part of the assignment you need to implement a function that calculates the epipolar lines that correspondto a set of points, under the epipolar constraint. This function should follow the function signature below:def compute_correspond_epilines(points, which_image, F): “””For points in an image of a stereo pair, computes the corresponding epilines in the other image :param points: numpy.array(float), an array Nx2 that holds the image points :param which_image: int, index of the image (1 or 2) that contains the points :param F: numpy.array(float), fundamental matrix between the stereo pair :return:epilines: numpy.array(float): an array Nx3 that holds the coefficients of the corresponding epipolar lines”””According to which image the points belong to, it should calculate the corresponding epilines under the epipolar constraint expressed by the fundamental matrix. You should check that points is a two dimensional array where the second dimension is equal to 2. Also, the which_image parameter should take only one value from the set {1,2} and the fundamental matrix should be a 3 ? 3 array. The epilines should be returned in the format (a,b,c), which are the coefficients of the line l(i) : ax + by + c = 0 that corresponds to the point p(i). Note that the coefficients should be normalized so thatp a2 + b2 = 1.4 Estimate Fundamental Matrix (50 points) For this part, you need to calculate the fundamental matrix for a stereo pair of images. First you need to load thetwo images left.jpg and right.jpg that are found under the data/ directory. Then you will need to extract SIFT features from their grayscale counterparts and find some good correspondences between the left and right image,

Read more

[SOLVED] Velocity and Variety

Discussion (Chapter 25):How do you define big data? What are the implications from the three industry trends (Three V’s), presented in the textbook, by the Gardner Group? Three V’s presented in the textbook are as follows: Volume, Velocity, and Variety.Need 250 to 300 words with references. No APA format required and the textbook is attached.

Read more

[SOLVED] Respect Privacy

ACM Code of Ethics and Professional ConductBY: Ammr AlharbiFor this situation stated, we should refer to “The Code” to see how it may be applied or may not be applied.1. GENERAL ETHICAL PRINCIPLES.1.6 Respect privacy:1.7 Honor confidentiality:2. PROFESSIONAL RESPONSIBILITIES.2.1 Strive to achieve high quality in both the processes and products of professional work:2.2 Maintain high standards of professional competence, conduct, and ethical practice:2.3 Know and respect existing rules pertaining to professional work:2.4 Accept and provide appropriate professional review:2.5 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks:2.6 Perform work only in areas of competence:2.7 Foster public awareness and understanding of computing, related technologies, and their consequences:2.8 Access computing and communication resources only when authorized or when compelled by the public good:2.9 Design and implement systems that are robustly and usably secure:3. PROFESSIONAL LEADERSHIP PRINCIPLES.3.1 Ensure that the public good is the central concern during all professional computing work:3.2 Articulate, encourage acceptance of, and evaluate fulfillment of social responsibilities by members of the organization or group:3.3 Manage personnel and resources to enhance the quality of working life:3.4 Articulate, apply, and support policies and processes that reflect the principles of the Code:3.5 Create opportunities for members of the organization or group to grow as professionals:3.6 Use care when modifying or retiring systems:3.7 Recognize and take special care of systems that become integrated into the infrastructure of society:4. COMPLIANCE WITH THE CODE.4.1 Uphold, promote, and respect the principles of the Code:4.2 Treat violations of the Code as inconsistent with membership in the ACM:

Read more

[SOLVED] Data Designation Type

Analyze the ERD for a student information system provided below. Be alert for the specifications provided for: 1) Entities, 2) Attributes, 3) Primary Key, and 4) Relationships. You will need to have a clear understanding for these components to create your database using MySQL.

Read more

[SOLVED] Cloud Computing Portfolio

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Read more

[SOLVED] Linux System Administrator

This is an individual assignment. You may discuss it with others, but your code and documentation must be written on your own.Linux technical expertise is essential in today’s computer workplace as more and more companies switch to Linux to meet their computing needs. Thus, it is important to understand how Linux can be used, what benefits Linux offers to a company, and how Linux has developed and continues to develop. As Linux system administrator you should be familiar with Linux operating system flavours and their capabilities. Linux may appear different depending on the distribution, your hardware and personal taste, but the fundamentals on which all graphical and other interfaces are built, remain the same.In this assignment, you are required to install Fedora Linux Workstation and Server operating system (Latest Version) on a virtual machine (e.g., Microsoft Hyper-V , VMWare Player or Oracle VM VirtualBox ) on your operating system as a guest. You should also find the minimum hardware requirements for most operating systems on the vendor’s website. For example, the Fedora Linux operating system minimum hardware requirements are documented at docs.fedoraproject.org . You should document the installation process with screenshots.#Task 1 to install Fedora workstation, you should do the following steps: (5 Marks)1. Virtual Machine configuration:a. Allocate 24.5 GB to the virtual machine’s hard diskb. Allocate 2.2 GB to the virtual machine’s memoryc. Configure NAT for IP Address conservation.d. Allocate 2 processor cores to the virtual machine. (Optional)2. pre-Storage configuration:a. You should manually partition the hard disk with the following specification:· 2.5 GiB Swap· 10 GiB root (/)· 500 MiB (/boot)· 11.5 GiB (/home/StudentID)b. Check the disk space command to view system disk usage,c. Create a directory on the Desktop called StudentID_ITC333_202130 .d. The directory icon should be displayed in the Desktop environment.e. You should use a related command to display the hard disk partitions.

Read more

[SOLVED] Industries and Locations

What is your definition of AI? Please explain.What is your opinion of AI, is the technology currently available? Why or why not?Please note at least four AI technologies, explain if they are truly AI or something else. Thoroughly explain your answer.How is AI perceived as different in various industries and locations? Please explain.

Read more

[SOLVED] Data Integrity

How can blockchain be implemented to achieve Data integrity for provenance and scalability purposes?

Read more

[SOLVED] Emerging Cybersecurity Threats

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet19 Mirai Botnet Authors Avoid Jail TimeYou have been asked to provide a short presentation for Business Leaders Round Table meeting in your community. The topic of the meeting is Emerging Cybersecurity Threats and What Businesses Need to Know. Your presentation will be part of a series of talks about the risks associated with unsecured cyber-physical systems. The organizers have asked you to begin by presenting an overview of the Mirai Botnet attacks followed by a discussion of threats and vulnerabilities which have been found in cyber-physical systems used to manage buildings and utilities.For this briefing, you will need to find and use three additional authoritative sources that provide information about threats, attacks, and vulnerabilities affecting cyber-physical systems.Format your presentation as a background paper to be shared with attendees. The target length as specified by the meeting organizers is 5 to 7 paragraphs in length.

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.